getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
References
Information
Published : 2019-06-05 07:29
Updated : 2019-06-13 14:29
NVD link : CVE-2019-12735
Mitre link : CVE-2019-12735
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
vim
- vim
neovim
- neovim